General

  • Target

    0d9314999cfab9c2019dc6e43c8bf16f88645e66978281ff93592cf7e33cd1fb.bin

  • Size

    1.5MB

  • Sample

    250520-1xsm9axqt2

  • MD5

    a923aef4a4c64b3dcecd85521cd1e47b

  • SHA1

    c2273a83d01f4ddc5eb3f469a008f0108df75b9f

  • SHA256

    0d9314999cfab9c2019dc6e43c8bf16f88645e66978281ff93592cf7e33cd1fb

  • SHA512

    df26c4194a6ae8f6bf15c5258740971eb9c6a7f45a0d5df2af2b46bcdd58e484db7d86cb36e079463cefb3a64be3455e864fa579ce9f48dec65ea07f15252e2a

  • SSDEEP

    24576:1+cgD6itMjBhdaRGsga4gafecoh4Fyu5WNCnbDQ9R+WnApSIRJy3n:WD6iqVhdaRbga4gxcu/+jbDQfOj4n

Malware Config

Extracted

Family

octo

C2

https://babagunukahramanimbenim.xyz/MzhiMTg0NTAwOTY5S/

https://babasozlerindebilgelik.xyz/MzhiMTg0NTAwOTY5S/

https://babalaricinkucakdolusu.xyz/MzhiMTg0NTAwOTY5S/

https://babagunuhatirasepeti.xyz/MzhiMTg0NTAwOTY5S/

https://babamlayasamdananilar.xyz/MzhiMTg0NTAwOTY5S/

https://babayatkinindurugucu.xyz/MzhiMTg0NTAwOTY5S/

https://babasinesaglikvemutluluk.xyz/MzhiMTg0NTAwOTY5S/

https://babagunusozvekalp.xyz/MzhiMTg0NTAwOTY5S/

https://babaogulkarsiliksizask.xyz/MzhiMTg0NTAwOTY5S/

https://babamyasamdesteğim.xyz/MzhiMTg0NTAwOTY5S/

https://babagunubaglantikuvveti.xyz/MzhiMTg0NTAwOTY5S/

https://babamlayoldaanilarimiz.xyz/MzhiMTg0NTAwOTY5S/

https://babagunusurpriznotlari.xyz/MzhiMTg0NTAwOTY5S/

https://babalaryasadandirilir.xyz/MzhiMTg0NTAwOTY5S/

https://babagunukalpmesajlari.xyz/MzhiMTg0NTAwOTY5S/

https://babamsenibircokseviyorum.xyz/MzhiMTg0NTAwOTY5S/

https://babagunuhuzurveguc.xyz/MzhiMTg0NTAwOTY5S/

https://babamlabirlikteheran.xyz/MzhiMTg0NTAwOTY5S/

https://babagunusoztasiyicisi.xyz/MzhiMTg0NTAwOTY5S/

https://babagunukutlumesaji.xyz/MzhiMTg0NTAwOTY5S/

rc4.plain

Extracted

Family

octo

C2

https://babagunukahramanimbenim.xyz/MzhiMTg0NTAwOTY5S/

https://babasozlerindebilgelik.xyz/MzhiMTg0NTAwOTY5S/

https://babalaricinkucakdolusu.xyz/MzhiMTg0NTAwOTY5S/

https://babagunuhatirasepeti.xyz/MzhiMTg0NTAwOTY5S/

https://babamlayasamdananilar.xyz/MzhiMTg0NTAwOTY5S/

https://babayatkinindurugucu.xyz/MzhiMTg0NTAwOTY5S/

https://babasinesaglikvemutluluk.xyz/MzhiMTg0NTAwOTY5S/

https://babagunusozvekalp.xyz/MzhiMTg0NTAwOTY5S/

https://babaogulkarsiliksizask.xyz/MzhiMTg0NTAwOTY5S/

https://babamyasamdesteğim.xyz/MzhiMTg0NTAwOTY5S/

https://babagunubaglantikuvveti.xyz/MzhiMTg0NTAwOTY5S/

https://babamlayoldaanilarimiz.xyz/MzhiMTg0NTAwOTY5S/

https://babagunusurpriznotlari.xyz/MzhiMTg0NTAwOTY5S/

https://babalaryasadandirilir.xyz/MzhiMTg0NTAwOTY5S/

https://babagunukalpmesajlari.xyz/MzhiMTg0NTAwOTY5S/

https://babamsenibircokseviyorum.xyz/MzhiMTg0NTAwOTY5S/

https://babagunuhuzurveguc.xyz/MzhiMTg0NTAwOTY5S/

https://babamlabirlikteheran.xyz/MzhiMTg0NTAwOTY5S/

https://babagunusoztasiyicisi.xyz/MzhiMTg0NTAwOTY5S/

https://babagunukutlumesaji.xyz/MzhiMTg0NTAwOTY5S/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Targets

    • Target

      0d9314999cfab9c2019dc6e43c8bf16f88645e66978281ff93592cf7e33cd1fb.bin

    • Size

      1.5MB

    • MD5

      a923aef4a4c64b3dcecd85521cd1e47b

    • SHA1

      c2273a83d01f4ddc5eb3f469a008f0108df75b9f

    • SHA256

      0d9314999cfab9c2019dc6e43c8bf16f88645e66978281ff93592cf7e33cd1fb

    • SHA512

      df26c4194a6ae8f6bf15c5258740971eb9c6a7f45a0d5df2af2b46bcdd58e484db7d86cb36e079463cefb3a64be3455e864fa579ce9f48dec65ea07f15252e2a

    • SSDEEP

      24576:1+cgD6itMjBhdaRGsga4gafecoh4Fyu5WNCnbDQ9R+WnApSIRJy3n:WD6iqVhdaRbga4gxcu/+jbDQfOj4n

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

MITRE ATT&CK Mobile v16

Tasks